gespenstern wrote: » 1. If you try to insist on stringent rules that hurt business, you'll end up with demotivated salesmen and struggling business. Business comes first before security, sorry security engineers! I say, download should be okay, but worth devising a plan, if it's not a permanent business need, to get rid of download access to non-approved cloud storage providers in X number of months with appropriate business line leadership. 2. Absolutely you should go with ADDS security groups, no individual accounts. These events (group membership change) get generated by ADDS on domain controllers, just make sure you 1) audit them 2) they get sent to your SIEM for search/preservation 3) you can configure either SIEM or other tool to produce alerts when important group memberships (domain admins, enterprise admins etc) change. A typical catch here though is firewalls usually don't know users/groups, they know IPs, and there should be a solution in place that tracks user to IP affinity and all of them (besides endpoint agent based, which is limited to supported operating systems) aren't 100% robust.
mnashe wrote: » Thank you for reply. I'm one of the ones that agree download access should be fine. The need for receiving these files is not going to stop. I'm all for blocking upload access, as I don't believe we should let employees send our data where ever they want. I asked this question to see if I was being naive for wanting to allow download access My firewall does recognize groups, but what I'm unfamiliar with is how to audit ADDS security groups? Is that a setting on the domain controller, or do I need to purchase a third party that can audit the security group membership changes? We don't currently have a SIEM. Any suggested tools?
mnashe wrote: » My firewall does recognize groups, but what I'm unfamiliar with is how to audit ADDS security groups? Is that a setting on the domain controller, or do I need to purchase a third party that can audit the security group membership changes?